Cybersecurity is a technical field that requires strong quantitative skills. Math is an important tool in cybersecurity, as it is used to create and maintain secure networks, protect data from attacks, and identify and prevent intrusions. Math also helps cybersecurity professionals to solve complex problems and keep networks and data secure
Wednesday, April 5, 2023
Math Matters in Cybersecurity: How Statistical Analysis and Anomaly Detection Help Protect Networks and Data
Thursday, March 30, 2023
Threat Hunting: A Proactive Approach to Cybersecurity
Cybersecurity is a constantly evolving field that requires defenders to keep up with the latest threats and techniques of attackers. Traditional security tools, such as firewalls, antivirus, and intrusion detection systems, are often reactive and rely on signatures or rules to detect known threats. However, these tools may not be enough to stop advanced persistent threats (APTs) that can evade detection and remain hidden in a network for months or even years.
How to Get Started with Network Forensics: A Practical Guide
Network forensics is the science and art of investigating and analyzing network traffic data to discover and recover evidence of cyberattacks. It is a vital skill for anyone who wants to protect their network from hackers, malware, or data breaches. In this article, you will learn the basics of network forensics, such as what it is, why it is important, and how it works. You will also learn about the tools and techniques that network forensics experts use to capture, record, and analyze network packets. By the end of this article, you will have a solid foundation of network forensics knowledge and skills that you can apply to your own network or career. Let’s get started!
Friday, January 15, 2021
How to think Analytically
One of the hardest things in being a defensive security analyst is being able to think with your analytical side of your brain. Training your self to think analytically will greatly help you be a great defensive security analyst.
Tuesday, May 21, 2019
What I been up to
Figured I would talk about what I been up to these past few years and why I haven't been posting much.
Tuesday, July 18, 2017
Information Security Training
Here is some training information for the cyber security analyst may need to know to be effective at monitoring the network of an organization. This is just a stripped down and formatted a little different than some of the other articles that I have written before. Lot of the resources will be the same.
Sunday, October 30, 2016
Splunk Extreme Search - xsCreateDDContext & xsWhere
Splunk has the ability to do some very impressive searches to help with statistical analysis. Some of those functions are not very well documented by Splunk's own internal documentation. I am going to go over a few commands and how they can be used.
Subscribe to:
Posts (Atom)